IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

quiz-placeholder

Similar activities

Digital divide

Digital divide

12th Grade

10 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

Online Safety

Online Safety

2nd Grade - University

10 Qs

Ordenador, sistemas operativos y redes. (2.- Hardware)

Ordenador, sistemas operativos y redes. (2.- Hardware)

12th Grade

10 Qs

Know thy Peer-to-Peer

Know thy Peer-to-Peer

12th Grade

10 Qs

Quiz persiapan USK

Quiz persiapan USK

12th Grade

12 Qs

TCP/IP & other protocols [A Level]

TCP/IP & other protocols [A Level]

12th Grade

14 Qs

WEB AUTHORING: QUIZ 4

WEB AUTHORING: QUIZ 4

9th - 12th Grade

12 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 51+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential source(s) of network vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port number used for HTTP?

80

443

418

27

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of organisational vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of software vulnerabilities

Downloading software from untrustworthy sources

SQL injection

Zero-day vulnerabilities

Failing to enforce a password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continuing to use an older operating system, well after it is no longer being supported by the developer is an example of which type of vulnerability?

Operating system vulnerability

Software vulnerability

Network vulnerability

Organisational vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The largest vulnerability for mobile devices...

The time it takes for the original equipment manufacturer (OEM) to update that system software

Hackers accessing the mobile network signal.

Failure to support CSMA with RTS/CTS

Users' inability to secure their own deceives with passcodes.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of physical vulnerabilities

Downloading software from untrustworthy sources

Theft of equipment

Social engineering

Failing to enforce a password policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?